Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 02:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe
-
Size
413KB
-
MD5
0174d909a137b49304b77774dc2a43f0
-
SHA1
2b640b570b0ff4eac5b709b390310965f003309b
-
SHA256
3333d7ec5965b7f14ce479e5b6664dbda35b8aa2cd64c3de548530b88e041e53
-
SHA512
5b1418b3d18317355cba32c85eed58ca7ceb0197db3c66e05db6488530b4f327d10afd86c481ffbe168bdb45cb51c48d90160241490d0724da321f5cb8a592fb
-
SSDEEP
12288:9hah2PKBPo8HLT8geZVmVR5xIwIFBhYqItMZohE:OwSyi8goSuBhYZ2
Malware Config
Extracted
Family
latentbot
C2
camyhonulux.zapto.org
Signatures
-
Latentbot family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1080 set thread context of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83 PID 1080 wrote to memory of 4480 1080 JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0174d909a137b49304b77774dc2a43f0.exe2⤵PID:4480
-